Professional Documents
Culture Documents
Dreswg Report
Dreswg Report
Recommendations on NLM
Digital Repository Software
Prepared by the
NLM Digital Repository Evaluation and Selection Working Group
Submitted December 2, 2008
Contents
1. Executive Summary .................................................................................................................... 1
2. Introduction and Working Guidelines ........................................................................................ 2
2.1. Introduction.......................................................................................................................... 2
2.2. Working Guidelines ............................................................................................................. 2
3. Project Methodology and Initial Software Evaluation Results ................................................... 4
3.1 Project Timeline .................................................................................................................... 4
3.2. Project Start: Preliminary Repository List ........................................................................... 4
3.3. Qualitative Evaluation of 10 Systems/Software .................................................................. 4
3.4. In-depth Testing of 3 Systems/Software .............................................................................. 7
4. Final Software Evaluation Results.............................................................................................. 9
4.1 Summary of Hands-on Evaluation ........................................................................................ 9
5. Recommendations ..................................................................................................................... 17
5.1. Recommendation to use Fedora and Conduct a Phase 1 Pilot ........................................... 17
5.2. Phase 1 Pilot Recommendations ........................................................................................ 18
5.3. Phase 1 Pilot Resources Needed ........................................................................................ 19
5.4. Pilot Collections................................................................................................................. 21
Appendix A - Master Evaluation Criteria Used for Qualitative Evaluation of Initial 10 Systems
....................................................................................................................................................... 23
Appendix B - Results of Qualitative Evaluation of Initial 10 Systems ........................................ 25
Appendix C DSpace Testing Results ......................................................................................... 27
Appendix D DigiTool Testing Results ...................................................................................... 41
Appendix E Fedora Testing Results .......................................................................................... 53
1. Executive Summary
The Digital Repository Evaluation and Selection Working Group recommends that NLM select
Fedora as the core system for the NLM digital repository. Work should begin now on a pilot
using four identified collections from NLM and the NIH Library. Most of these collections
already have metadata and the NLM collections have associated files for loading into a
repository.
The Working Group evaluated many options for repository software, both open source and
commercial systems, based on the functional requirements that had been delineated by the earlier
Digital Repository Working Group. The initial list of 10 potential systems/software was
eventually whittled down to 3 top possibilities: two open source systems, DSpace and Fedora,
and DigiTool, an Ex Libris product. The Working Group then installed each of these systems on
a test server for extensive hands on testing. Each system was assigned a numeric rating based on
how well it met the previously defined NLM functional requirements.
While none of the systems met all of NLM's requirements, Fedora (with the addition of a front
end tool, Fez) scored the highest and has a strong technology roadmap that is aggressively
advancing scalability, integration, interoperability, and semantic capabilities. The consensus
opinion is that Fedora has an excellent underlying data model that gives NLM the flexibility to
handle its near and long-term goals for acquisition and management of digital material.
Fedora is a low-risk choice because it is open-source software, so there are no software license
fees, and it will provide NLM a good opportunity to gain experience in working with open
source software. It is already being used by leading institutions that have digital project goals
similar to NLM's, and these institutions are an active development community who can provide
NLM with valuable advice and assistance. Digital assets ingested into Fedora can be easily
exported, if NLM were to decide to take a different direction in the future.
Implementing an NLM digital repository will require a significant staffing investment for the
Office of Computer and Communications Systems (OCCS) and Library Operations (LO). This
effort should be considered a new NLM service, and staffing levels will need to be increased in
some areas to support it. Fedora will require considerable customization. The pilot project will
entail workflow development and selection of administrative and front end software tools which
would be utilized with Fedora.
The environment regarding repositories and long term digital preservation is still very volatile.
All three systems investigated by NLM have new versions being released in the next 12 months.
In particular, Ex Libris is developing a new commercial tool that holds some promise, but will
not be fully available until late 2009. The Working Group believes NLM must go forward now
in implementing a repository; the practical experience gained from the recent testing and a pilot
implementation would continue to serve NLM with any later efforts. After the pilot is completed,
NLM can re-evaluate both Fedora and the repository software landscape.
Future Growth
The NLM digital repository should provide a platform and flexible development environment
that will enable NLM to explore and implement innovative digital projects and user services
utilizing the Library's digital objects and collections. For example, NLM could consider utilizing
the repository as a publishing platform, a scientific e-learning/e-research tool, or to selectively
showcase NLM collections in a very rich online presentation.
2.2.2. Resources
OCCS
Staff will provide system architecture and software development resources to assist in the
implementation and maintenance of the NLM digital repository.
Library Operations
Staff will define the repository requirements and capabilities, and manage the lifecycle of NLM
digital content.
Advantages:
o Strong search capabilities.
Risks:
o Small user population.
o Reliability and development path of vendor unknown.
CONTENTdm
DAITSS
Developed by: Florida Center for Library Automation (FCLA) (open source) and
released under the GNU GPL license as a digital repository system for 11 public
universities.
Advantages:
o Richest preservation functionality.
Risks:
o Back-end/archive system.
o Must use DAITSS in conjunction with other repository or access system.
o Planned re-architecture over next 2 years.
o Limited use and support; further development dependent on FCLA (and FL state
legislature).
DigiTool
DSpace
Developed by: MIT Libraries and HP Labs (open source) as one of the first open source
platforms created for the storage, management, and distribution of collections in digital
format.
Advantages:
o "Out-of-the-box" open source solution.
o Provides some functionality across all functional requirements.
o Community is mature and supportive.
Risks:
o Planned re-architecture over next year.
o Current version's native use of Dublin Core metadata is somewhat limiting.
EPrints
The Subgroup decided to discontinue the evaluation due to EPrints (open source) lack of
preservation capabilities and its ability to only provide a small-scale solution for access to
pre-prints.
Fedora
Developed by: University of Virginia and Cornell University libraries (open source).
Advantages:
o Great flexibility to handle complex objects and relationships.
o Fedora Commons received multi-million dollar award to support further
development.
o Community is mature and supportive.
Risks:
o Complicated system to configure according to NLM research and many users.
o Need additional software for fully functional repository.
Greenstone
Developed by: Cooperatively by the New Zealand Digital Library Project at the
University of Waikato, UNESCO, and the Human Info NGO (open source).
Advantages:
o Long history, with many users in the last 10 years.
o Strong documentation with commitment by original creators to develop and
expand.
o Considered "easy" to implement a simple repository out of the box.
o DL Consulting available for more complex requirements.
o Compatible with most NLM requirements.
Risks:
o Program is being entirely rewritten (C++ to Java) to create Greenstone 3. Delivery
date unknown.
Keystone DLS
VITAL
Developed by: VTLS, Inc. (commercial) as a commercial digital repository product that
combines Fedora with additional open source and proprietary software and provides a
quicker start-up than using Fedora alone.
Advantages:
o Vendor support for Fedora add-ons.
Risks:
o Vendor-added functionality may be in conflict with open-source nature of Fedora.
A Consolidated Digital Repository Test Plan was created based on the requirements enumerated
in the NLM Digital Repository Policies and Functional Requirements Specification. The Test
Plan contains 129 specific tests, and is represented in a spreadsheet. Each test was allocated to
one of the four subgroups, who were tasked to conduct that test on all three systems.
DSpace 1.4.2, DigiTool 3.0, and Fedora 2.2/Fez 2 Release Candidate 1 were installed on NLM
servers for extensive hands-on testing. OCCS conducted demonstrations and tutorials for DSpace
and Fedora, and Ex Libris provided training on DigiTool, so that members could familiarize
themselves with the functionalities of each system. The Consolidated Digital Repository Test
Plan guided the testing and scoring of the three systems. Details of the testing are available in
the next section.
DSpace
DigiTool
36
40
16
42
134
51
66
27.5
45
189.5
Fedora (w/Fez)
49.75
52.5
40.75
56.5
199.5
Data model well suited for academic faculty deposit of papers but does not easily
accommodate other materials.
All bitstreams uniquely identified via handles and stored with checksums.
Very limited relationships between bitstreams (html document can designate the primary
bitstream, hiding the secondary files that make up a web page).
Workflow limited to three steps.
Dublin Core metadata required for ingest. Other metadata can be accepted as a bitstream
but would not be searchable.
Versioning of objects/bitstreams not supported.
Some usage and inventory reporting built-in.
DSpace uses the database to store content organization and metadata, as well as
administrative data (user accounts, authorization, workflow status, etc).
User access controls are moderate, with authorizations logic restricting functions to
admin users or authenticated users.
Although objects can have text files associated as licenses, there is not application logic
to make use of license data, and no built-in way to facilitate content embargoes/selective
user access.
Entire collections can be hidden to anonymous users, but metadata remains viewable.
Audit history written to a cumulative log which must be parsed by scripts into humanreadable formats, and metadata actions are only sparsely logged.
External automated access to Dublin Core metadata via OAI-PMH.
Content is searchable by Dublin Core metadata and full text.
Files are listed in the order they were ingested and cannot be sorted.
Platform support: DSpace runs on Solaris, Linux, other UNIX, or Windows servers. It
is a Java application, and uses Apache Tomcat, Apache Ant, and other open source Java
tools. DSpace uses a relational database that can be Oracle, PostgreSQL, or MySQL.
Deployment and maintenance: OCCS personnel installed several copies of DSpace on
Windows computers for initial testing and demonstration. OCCS then installed DSpace
on an NLM Solaris server using an Oracle database for full testing and evaluation.
DSpace is relatively simple to install and build, and has limited but adequate
documentation. DSpace includes user interfaces for public access and repository
administration; however, these interfaces are very plain, and difficult to customize.
10
Installation and usage problems can often be solved by asking for assistance from
members of the DSpace community, by posting a request on the DSpace email list server.
Development and user organizations: DSpace has a very active user community and
open source development community, with over 400 institutional users worldwide
including NLM LHC for the SPER research project. DSpace was initially developed with
support from MIT and HP. In 2007, the DSpace Foundation was formed to continue
development of the open source software and support its community.
Future roadmap: Future plans for DSpace are not crystal clear, but there is good
promise for continued development and community support:
o A DSpace 2.0 architecture has been defined that will introduce major
improvements to the tool, and development of these enhancements has already
begun.
o Plans are being made for significant collaboration with the Fedora Commons
community, to address needs and functions that are common to these two tools.
Grant funding for planning joint activities has recently been obtained from the
Andrew W. Mellon Foundation.
Overall, the group was impressed with the broad range of tools and continued to discover
new functionality, although the discovery was difficult at times.
The ingest process is one example of the difficulty the group experienced: understanding
the use of the legacy Meditor and the web ingest tool and the difference between deposit
and ingest. Ingest workflows seemed overly complex.
Certain challenges were a result of the NLM environment: the security lockdown, the
Meditor installation, and ActiveX.
Quite a few tests were conducted. The group was particularly happy with the range of file
types (DigiTool really shines in this area) and areas of metadata handling, especially in
terms of METS.
Other positive aspects are the automatic format configurations and the support of
relationships between digital entities (parent-child, for example).
Weak areas include lack of specific support for quality assurance and audit functionality
and the overall system configuration management.
Standards support is good.
The group's evaluation considered staff users as well as end user needs and functionality.
11
Access features in both areas were pretty strong, in terms of granularity of permissions,
access protocols (Z39.50, OAI-PMH, etc.), and the search results display.
The group would like to see more flexibility in search options, such as relevance ranking,
proximity, and "more like this." Poor browsing features and no leveraging of authority
control. The group recognizes many of these features are available via Primo and through
some customization of Oracle.
Good faith effort towards Section 508 compliance is well-documented by the vendor.
Generally, the feeling is that DigiTool very strong in the access area.
DigiTool has many rich features, especially the use of METS extraction, JPEG 2000
thumbnail creation, and tagging master files in two ways.
The rollback feature is good.
Weak areas include the lack of confirmation for ingest and individual rather than batch
ingest.
The group recognizes that most preservation functionality will be offered with the Ex
Libris Digital Preservation System (DPS), currently in development. Many customers
will continue using DigiTool and have no need for the enhanced preservation
functionality that will be offered by the DPS.
Platform support: DigiTool runs on either a Solaris or Linux server, with an embedded
Oracle database. The Meditor administrative client software runs on a desktop PC.
Deployment and maintenance: Installation was performed by Ex Libris on an NLM
Solaris server; the vendor will not allow the software to be installed by the user
organization. The installation requirements presented no particular difficulties, with the
exception of the Meditor client software which required administrator privilege to install
on user PCs. Parts of the code base are very old, having been migrated from a legacy
COBOL product. Ex Libris provided detailed training on the use of the software, and
was responsive in answering questions.
Development and user organizations: The DigiTool product development team is
located in Israel, and is accessible via web conference and teleconference. A separate
team at Ex Libris is also developing a new repository product, the Digital Preservation
System. Contacted users reported mixed experiences with DigiTool - a few are happy
(e.g., Boston College), but others were disappointed and abandoned the product (e.g.,
12
Fedora is very strong in the range of files that can be ingested, metadata requirements,
versioning, relationships, and audit trails.
Fedora's web services-based interface to repository content makes it easy to integrate
with external tools and custom front-ends.
Fedora is weak in workflow capabilities. Fez ranges from minimum to adequate in
workflow capabilities.
Fedora provides good support for standards compliance: SOAP, OAI, Unicode, METS,
PREMIS, etc.
One question is whether Fedora can catch transmission errors when a file is ingested from
a directory, a function available in SPER. Fedora can compute a checksum and add it to
the SIP, and it will verify checksums, but there appears to be a bug: the checksums
always match. This problem should be fixed in version 3.0.
Fedora provides great flexibility and granularity re: access controls at the user, collection,
object, datastream and disseminator levels. The downside to this flexibility is that it
13
requires custom policies to be written using a specialized markup - learning curve for the
admin/developer staff.
Fez also has granular security options, including Active Directory integration. The
Group was not able to successfully test some of the access control logic. A big downside
to the administration of the controls is the need to multi-select values using the Ctrl key,
making it very easy to accidently deselect values which may not even be visible to the
user.
Fedora includes an OAI-PMH service which can provide the Dublin Core metadata
associated with an object. This service could run (on Fedora) with a Fez implementation
as well.
Fedora has a very basic default end-user interface but is extremely flexible in its ability to
integrate with third-party front-ends. Fez offers a rich end-user UI including UTF8
character support, controlled keyword searching, and output into RSS. Both systems do
not adequately highlight a preferred version of an object over other versions also made
visible to the end user.
Full text searching is available with both systems via a third-party indexing plug-in.
Fedora's disseminator approach offers much flexibility to content delivery, and Fez's
inability to leverage the dissemination is a significant downside to the Fez product.
4.1.3.3. Metadata and Standards, score=Fedora 40.75; Fez 33.75; Combined Fedora/Fez:
40.75
4.1.3.4. Preservation and Workflows, score=Fedora: 55; Fez: 41.5; Combined Fedora/Fez
maximum: 56.5
Fedora provides a solid core set of preservation capabilities that can be extended with
companion tools (e.g. JHOVE for technical metadata extraction).
Fedora/Fez does not create a physical AIP package but generates a FOXML/METS file
that contains metadata and links to all datastreams during ingest.
Fedora assigns a PID and generates a checksum for each ingested datastream.
Fez can generate three different .jpg derivatives for each ingested image datastream. The
subgroup was unable to test Fedora's disseminator.
GSearch (the Fedora Generic Search Service) may be implemented with Fedora to index
all metadata captured in FOXML/METS but style sheets must be written to enable
GSearch functionality.
14
Fedora allows data to be exported in three different ways: archive, migrate and public
access but Fez has a very limited data export function.
Fedora/Fez provides ingest confirmation on screen but no summary statistics. The
subgroup was unable to test mail notification functionality because the mail server was
not set up.
The purge function in Fez does not delete an object from the repository. In Fedora,
purging deletes an object.
Still have a need for workflows, if not for the software itself than for external business
functions.
User interface: Fedora does not include a public web access user interface, so
an external interface must be added. Options include open source tools designed for use
with Fedora such as Fez and Muradora, or custom web pages developed in-house. The
Fez product restricts Fedora's flexibility in some key areas (access controls and content
modeling) and appears to be more tightly integrated into Fedora than other front ends
(which could be swapped out without touching the content or core services). New
versions of the Fez and Muradora tools are expected to be released in the next few
months, and the Fedora Commons organization is now focusing attention on the Fedora
community's need for a flexible user interface approach.
Search: Fedora includes an optional search component called GSearch that can search
any metadata or text data in the repository. Because of time limitations, only the more
limited default Fedora search component was tested. The full GSearch
component should be implemented with Fedora. Resource Index database for storing
relationships among objects as semantic concepts for querying by discovery tools.
Platform support: Fedora runs on Solaris, Linux, other Unix, or Windows servers. It is
a Java application, and uses Apache Tomcat, Apache Ant, and other open source Java
tools. Fedora uses a relational database that can be Oracle, MySQL, PostgreSQL,
McKoi, or others.
Deployment and maintenance: OCCS personnel installed several copies of Fedora on
Windows computers for initial testing and demonstration. OCCS then installed Fedora
on an NLM Solaris server using an Oracle database for full testing and evaluation.
Fedora is easy to install and is accompanied by clear and comprehensive documentation.
An installation script is provided that guides the installation and configuration process.
Fedora 2.2.2 was the production release version of the software when the NLM
evaluation began, and was the version installed for testing. During testing, Fedora 3.0
was released, a significant upgrade with new features and simplified code base. NLM
spoke with several Fedora users, and all plan to upgrade to version 3.0. Fedora 3.0
should be used instead of earlier versions.
Development and user organizations: Fedora has an active user community, with more
than 100 user institutions listed in the Fedora Commons Community Registry. The first
prototype of Fedora was begun in 1997, and the project was led for several years by
University of Virginia and Cornell University with grant money obtained from the
Andrew W. Mellon Foundation. In 2007, Fedora Commons was incorporated as a nonprofit organization, and received nearly $5 million in grant money from the Gordon and
15
Betty Moore Foundation to continue development of the Fedora software, and to provide
the resources needed to build a strong open source community. Fedora Commons
supports the user and developer community with an active project web site, a wiki, and
several email lists. All source code is managed on SourceForge. The Moore grant funds
a leadership team, chief architect, lead developer, and several software developers.
Several dozen additional developers are actively involved in the community at user
institutions. Fedora is being used by leading institutions that have digital projects goals
similar to NLM's. The users NLM has contacted are enthusiastic and confident in their
choice of Fedora. They are building effective digital collections, and they can provide
valuable advice and lessons-learned to NLM. Fedora is built using technologies that
OCCS is prepared to support, including Java, Tomcat, XML, and web services.
Future roadmap: The Fedora Commons Technology Roadmap is published on the
Fedora Commons web site, and defines the Fedora vision, goals, priorities, and five
major projects, with detailed development plans and schedules. Some projects are
primarily directed by Fedora Commons, and others are collaborations with other open
source projects.
Security: OCCS conducted a web application security scan of Fedora using IBM's
AppScan scanning tool, and found 1 high-severity and 1 low-severity issues. The highsecurity issue was a Cross-site scripting vulnerability. The remediation for this
vulnerability is to filter out hazardous characters from user input. This issue should be
addressed in consultation with the Fedora Commons community leadership. The
AppScan tool provides detailed information about the vulnerability and the coding
approach needed to correct it. Additional details of the security scan are provided in the
DRESWG Security Scan Results.
16
5. Recommendations
5.1. Recommendation to use Fedora and Conduct a Phase 1 Pilot
The Digital Repository Evaluation and Selection Working Group recommends Fedora as the core
system for the NLM digital repository and to start now on a phase 1 pilot to involve real
collections. Fedora's architecture should enable NLM to ingest, manage, and deliver exotic
content as well as the typical digital scans of print originals. It has the potential to encourage
creative approaches to digital library research and development, e-publishing, e-scholarship, and
e-science.
Fedora has been implemented by a number of institutions involved in innovative digital services,
including Indiana University, Rutgers University, Tufts University, the University of Virginia,
the Max Planck Society (eSciDoc), the National Science Foundation (The National Science
Digital Library), the Public Library of Science, and the Inter-University Consortium for Political
and Social Research.
Drawbacks include the extensive customization, training, and support required to implement and
manage the complex architecture. Considerable time also will be invested in developing detailed
workflows for Fedora. These risks, while significant, do not outweigh the system's benefits.
5.1.1 Key reasons for Fedora
Provides the flexibility that will be needed to handle NLM's near-term and foreseeable
future needs.
Has a strong technology roadmap that is aggressively advancing scalability, integration,
interoperability, and semantic capabilities.
Is being used by leading institutions that have digital projects goals similar to NLM's.
Has an active open source development community that is well-funded with grant money.
Fedora is cutting edge yet bounded by a strong commitment to standards.
Strongest and most flexible metadata support of all candidates - it is not bound to any
single scheme.
Hands-on functional testing has demonstrated that Fedora by itself scored well against
NLM functional requirements, and, with the Fez add-on front-end tool, scored higher
than DSpace and DigiTool.
Fedora is a low-risk choice for NLM at this time:
o Fedora is open source software, so there are no software license fees.
o Other institutions like NLM are building effective digital collections using
Fedora, and they can provide valuable advice and lessons-learned.
o Digital assets ingested into Fedora can be easily exported, if NLM were to decide
to take a different direction in the future.
o Fedora is a good opportunity for NLM to gain experience with open source
software.
o Fedora is developed and maintained using technologies that OCCS can support.
17
Fedora just released version 3.1 which makes significant improvements in defining the
content model.
DSpace architecture will undergo major improvements with a new version, DSpace 2.0.
Plans are also being made for significant collaboration between the DSpace and Fedora
communities and NLM should keep abreast of how these plans could support NLM's use of
Fedora.
The pilot group may also want to determine if NLM should conduct a formal test of the Ex Libris
Digital Preservation System (DPS). DPS is an emerging new commercial tool that offers future
promise for digital repository applications:
DPS is being developed to meet the requirements of the National Library of New Zealand
(NLNZ), which rejected DigiTool.
Release 1.0 is expected to be generally available by end of 2008/early 2009.
NLNZ has gone live with DPS and is happy with the results so far.
Use of Fedora open source software gives NLM the opportunity to select and incorporate
"best-of-breed" companion tools.
NLM can replace or add new tools as better alternatives become available.
Tool awareness, evaluation, and selection will be a part of NLM's repository evolution
process.
Companion tool investigation needed during phase 1 pilot:
o Administrative interface tools: The pilot group should not commit immediately
to Fez but should investigate alternative administrative interface tools such as
Muradora or the Rutgers Workflow Management System.
o Preservation tools: Determine use of JHOVE and related tools such as DROID
for file identification, verification and characterization.
o Public user interface tools: Research and implement either open source or
commercial page turning or other front end access capabilities and software.
18
5.2.2. Workflows
The pilot group should make workflow recommendations over time and workflows may
be tied to the collection or type of material.
Workflows to be initially examined probably include metadata needed for SIPs
(Submission Information Package) and format characterization.
Develop a first pilot collection that already has metadata and associated files. Produce a
"quick" success to show progress.
Manage the content in one secure place.
Focus on defining the core functions in the areas of: data models, metadata, preservation
and SIP creation.
Investigate interfaces with Voyager to maximize use of existing metadata.
Provide an initial public presentation using a simple Web interface.
Investigate and begin to implement key preservation aspects to ensure master files are
preserved.
8-18 months:
Implement an additional one or two pilot collections (of the 4 proposed in section 5.4).
Begin making recommendations on institutional workflows.
Implement an administrative interface or collaborate with other users to evolve some
open source alternative, or integrate/develop our own.
Implement one or two unique public access capabilities (e.g., a page turning application).
NLM should investigate potential participation in the Fedora Commons community, e.g.,
the Fedora Preservation and Archiving Solution Community group. Participation could
enable NLM to influence future software features. NLM should also investigate potential
partnerships with leading Fedora users, e.g., University of Maryland, University of
Virginia, or others. (These are strategic/management decisions.)
NLM should consider contributing source code to the Fedora community only after the
pilot phase, if NLM decides to continue its use of Fedora. NLM should become a
participant rather than a "lurker."
Before NLM shares any code it may want to consult with NIH legal counsel.
19
5.3.1. LO
.8 FTE Project Manager and Analyst. Develops phase 1 pilot plan including scope,
schedule and deliverables. Tracks changes to requirements and monitors project progress.
Provides technical input and oversight of all major functional areas.
.5 FTE Metadata Specialist
2.1 FTE Analyst
All the above to perform the following:
o Analyze and develop workflows for various ingest and process models. (Refers to
both single-file and batch mode).
o Determine metadata schema(s) and element requirements for technical and
descriptive metadata.
o Define user community and access permissions. Develop specifications, specify
requirements for interfaces with other internal systems and assist in developing
integration plans for identified tools.
o Develop specifications for management, preservation, and statistical reports
including access methods, file formats, and delivery options.
o Define data requirements including file formats, directory structure and
information package for ingest.
o Develop QA checklists for automatic and manual processes including data
integrity checks and file format identification, validation and characterization.
o Specify automatically generated error/confirmation/summary reports. (Refers to
master, derivative and metadata files). Define derivative requirements.
o Develop preservation plan including master file management, integrity checks,
backup plan, file migration, etc.
.5 FTE User Interface Analyst. Takes lead in designing staff and public web interfaces,
including search options and viewing capabilities. Insures that usability testing,
performance analysis, and 508 compliance are conducted according to NLM guidelines
and standards. Additional guidelines may need to be developed depending on user needs
for repository collections and formats.
5.3.2. OCCS
20
Systems Engineer responsible for server preparation, network setup, system software
configuration, etc.
Database Administrator responsible for database configuration and administration.
21
research project and a project summary. More detail may be provided through individual project
reports, which describe research objectives, methods, major findings, and resultant publications.
In the mid-1990s, digital copies of many of the reports began to appear on Institute and Center
web sites. Since 1998, intramural reports also have been submitted to the NIH Intramural
Database for searching and viewing by NIH staff and the public (see NIDB Resources at
http://intramural.nih.gov/mainpage.html). The NIH Library maintains a collection of older print
NIH annual reports, totaling more than 700 volumes. To fill gaps in digital access, the Library
plans to digitize the annual report collection, beginning with reports issued by the Clinical
Center. The Clinical Center annual reports span thirty-five years, from 1958 to 1993. A pilot
collection of eleven volumes has been selected for digitization and deposit in the NLM digital
repository, covering fiscal years 1981 through 1993.
22
Acceptable: O/S: Windows 2003, Linux Red Hat ES; DB: MySQL; Web: (no constraints for now
OCCS will evaluate)
Evaluation: 0-3 assessment scale (see below)
Demonstrated successful deployments Relative number of satisfied users (organizations).
Evaluation: 0-3 assessment scale (see below)
System support Quality of documentation, and responsiveness of support staff or developer/user
community (open source) to assist with problems.
Evaluation: 0-3 assessment scale (see below)
Strength of development community Reliability and support track record of the company providing the
software; or size, productivity, and cohesion of the open source developer community.
Evaluation: 0-3 assessment scale (see below)
Stability of development organization Viability of the company providing the software; or stability of the
funding sources and organizations developing open source software.
Evaluation: 0-3 assessment scale (see below)
Strength of technology roadmap for the future Technology roadmap that defines a system evolution path
incorporating innovations and next practices that are likely to deliver value.
Evaluation: 0-3 assessment scale (see below)
To be considered only after the functional and technical criteria above are addressed:
Cost Expected total cost of software deployment, including initial cost of software, plus cost of software
integration, modifications, and enhancements.
Evaluation: 0-highest cost 3-lowest cost
Assessment Scale
0 None
1 Low
2 Moderate
3 High
24
Top
contenders
Fedora
DSpace
Further
evaluation and
discussion
needed
DAITSS
Greenstone
Advantages
Risks
Complicated system to
configure according to our
research and many users.
Need additional software
for fully functional
repository.
Scalability and flexibility
may be issues.
NLM may be too
dependent on one vendor
for its library systems.
Planned re-architecture
over next year.
Current versions native
use of Dublin Core
metadata somewhat
limiting.
Open source
Open source
Back-end/archive system.
Must use DAITSS in
conjunction with other
repository or access
system.
Planned re-architecture
over next 2 years.
Limited use and support;
further development
dependent on FCLA (and
FL state legislature).
Program is being entirely
rewritten (C++ to Java) to
create Greenstone 3.
Delivery date unknown.
Development community
beyond the originators is
not as rich as other opensource systems.
DL Consulting recently
awarded grant to further
improve Greenstones
performance when scaled
up to very large
collectionsimplies it may
not do so currently.
Core developers and
consultants in New
Zealand.
Open source
Vendor
Open source
For further
investigation
Notes
Ingest issues
Type (open
source,
vendor)
Keystone DLS
No further
consideration
needed at this
time
ArchivalWare
(PTFS)
CONTENTdm
(OCLC)
EPrints
VITAL (VTLS)
Advantages
Risks
Open source
Vendor
Vendor
Good scalability.
Open source
Vendor
Vendor-added functionality
may be in conflict with
open-source nature of
Fedora.
For further
investigation
Notes
Test ID
Source
Requirements
7.1.1.1
7.1.1.2
Subgroup
See
Note 1
Score
(0-3)
Note 2
T
T
File types - Demonstrate that the system can ingest content in all the file
formats listed as "supported" in Appendix B of the NLM DR Functional
Requirements document (plus MP3 and JPEG2000), specifically: MARC,
PDF, Postscript, AIFF, MPEG audio, WAV, MP3, GIF, JPEG, JPEG2000,
PNG, TIFF, HTML, text, RTF, XML, MPEG.
Demonstrate that the system can ingest the following types of content:
articles, journals, images, monographs, audio files, video files, websites,
numeric data, text files, and databases.
Conduct this test element by ingesting the set of files listed in the Test File
spreadsheet. (The files listed in this spreadsheet contain examples of all the
file formats, and all the content types identified above.)
7.1.1.7
7.1.1.9
Manual review - Demonstrate that the system has the capability to require
that submitted content be manually reviewed before it is accepted into the
repository.
Demonstrate that the system maintains submitted content in a staging area
before it is accepted.
Demonstrate that the system notifies a reviewer when new content is ready for
review.
(Also see tests for 7.1.4.1, 7.1.4.2, and 8.1.2.)
Review and acceptance workflow - Demonstrate that the system supports a
workflow for the review and acceptance of submitted content. Demonstrate
that the workflow includes the following functions:
- Receive and track content from producers; YES
- Validate content based on submitter, expected format, file quality,
duplication, and completeness; NO
- Normalize content by converting content into a supported format for final
ingestion into the repository; NO
- Human review of content; YES
- Acceptance or rejection of content or file format. YES
7.1.1.1
7.1.1.2,
7.1.1.10
Not
es
7.1.1.3
7.1.1.3
7.1.1.4
Rejection filter - Demonstrate that the system allows the creation of a filter
that can be used to automatically reject submitted content. (This capability will
eliminate the need for manual review of some submissions and
resubmissions.)
Rejection notification - Demonstrate that the system can notify the producer
or donor when submitted content is rejected. Demonstrate two cases: (1)
notification after immediate rejection by an automated process, and (2)
notification after rejection by manual review.
7.1.1.4
7.1.1.5,
7.1.1.11
1 - No
2 - Yes by email
7.1.1.5
(7.1.1.8)
Metadata types - Demonstrate that the system can ingest content with
associated metadata in the following formats: all NLM DTDs, Dublin Core,
MARC21, MARCXML, ONIX, MODS, EAD, TEI, PREMIS, METS. (NOTE: This
test is covered by tests 8.1.1, 8.1.8, and 8.1.9)
7.1.1.8,
8.1.1,
8.1.8,
8.1.9
M/T
7.1.1.10
7.1.1.10,
7.1.1.2
7.1.1.12
Versions - Demonstrate that the system can store, track, and link multiple
versions of a file.
7.1.1.14
7.1.1.12
7.1.1.14
1 (M & T)
7.1.1.15a,
7.1.1.15b
7.1.1.15b
7.1.1.15b
Item=parent; bitstreams=children
Bitstreams can be "bundled," though
this is not apparent to users.
HTML page can be designated as
"primary"
7.1.1.16
Audit trail - Demonstrate that the system maintains an audit trail of all actions
regarding receiving submissions (SIPs).
7.1.1.16
7.1.1.15a
1.5
7.1.2.1
7.1.2.1
7.1.2.2
7.1.2.2
7.1.2.3
7.1.2.3
7.1.2.4
7.1.2.4
7.1.2.5
7.1.2.5
7.1.2.6
7.1.2.7b
Error reports - Demonstrate that the system generates error reports for ingest
quality assurance problems.
7.1.2.7b
7.1.2.8
7.1.2.8
7.1.2.6
1
2
1.5
1
7.1.2.9
Audit trail - Demonstrate that the system maintains an audit trail of all actions
regarding ingest quality assurance.
7.1.2.9
7.1.4.1
7.1.4.2
7.1.4.2
7.1.4.4
7.1.4.5
7.1.4.7
Audit trail - Demonstrate the creation of an audit trail of all actions.
7.1.3 Ingest - Generate AIP
7.1.4.7
Note 3
M
P
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
7.4 Administration
Note 3
7.1.4.5
Generate AIP - Demonstrate the generation of AIPs from ingested SIPs that
do not need normalization.
Rather clunky
2
0
P1 - Generate AIP
P1-1
7.1.4.1
7.1.4.4
P
7.1.3.1,
7.1.3.2,
7.1.3.3,
7.4.1
Yes
P1-2
7.1.3.1,
7.1.3.2,
7.1.3.3,
7.4.1
P1-3
7.1.3.6
Yes
P1-4
Master files - Demonstrate the generation of AIPs that consist of master files
only.
7.1.3.6
Yes
P1-5
7.1.5.1,
7.2.1.1,
7.2.1.2
Yes
P1-6
7.1.5.2,
7.3.4.1
Yes
P1-7
7.1.5.4
Yes
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P1-9
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P1-10
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P1-8
P2-1
7.2.2.1,
7.2.3.2,
7.2.4.1
P2-2
7.2.4.2,
7.3.1.1,
7.3.1.2,
7.4.4
P2-3
7.2.4.2,
7.3.1.1,
7.3.1.2,
7.4.4
P2-4
7.2.4.3
P2-5
User views - Demonstrate the ability to allow for customized user views of the
contents of the storage (create, maintain, and access).
7.3.1.4
P2-6
7.4.2
Yes
P2-7
7.3.1.3
Yes
P2-8
Delete AIPs - Demonstrate the ability to allow the authorized staff to delete
AIPs from the repository including: removing the digital object's files and
retaining associated metadata, or removing both the files and metadata.
7.4.3.4
Yes
P2-9
7.4.3.5
No
P2-10
7.4.3.6
No
P2-11
Request DIPs for update - Demonstrate the ability to allow the authorized
staff to request DIPs for file migrations and data updates.
7.3.4.1,
7.3.4.2,
7.3.4.3,
7.4.3.1,
7.4.3.2,
7.4.6.2
P2-12
7.4.3.3
P2-13
7.3.2.1,
7.3.2.3,
7.4.6.1
Yes
P2-14
7.3.2.2
P2-15
Queries against all metadata - Demonstrate the ability to run data queries
against all metadata used to manage the repository.
7.3.2.4
Yes
P2-16
Audit trial - Demonstrate the creation of an audit trail of all actions including
who, when, how, what and where for Archive Storage and Data Management
Database.
7.1.3.4,
7.1.5.6,
7.2.1.4,
7.2.2.3,
7.2.5.2,
7.3.2.5,
7.3.3.7,
7.3.4.6,
7.4.3.7,
7.4.6.4
P2-17
7.3.3.1,
7.3.3.2,
7.3.3.5,
7.3.4.4
P2-18
7.3.3.4
P2-19
Time period for reports - Demonstrate the ability to allow the user to specify
a time period or set of time periods for reports and statistics.
7.3.3.6
Yes
P3 - Generate DIP
P3-1
P
7.1.5.5,
7.2.5.1,
7.4.6.2
7.4.6.2,
7.4.3
7.4.1.1
7.4.1.1
7.4.1.2
7.4.1.2
7.4.1.5
7.4.1.5
Audit trail - Demonstrate that the system maintains an audit trail of all actions
related to submission agreements.
7.4.1.6
P3-2
7.4.1.6
Yes
7.4.2.1
7.4.2.1
7.4.2.2
7.4.2.2
7.4.2.3
7.4.2.3
In log file.
7.4.2.4
7.4.2.4
7.4.2.5
Operational statistics - Demonstrate that the system collects and can display
operational statistics concerning Archival Storage.
7.4.2.5
2
0
Audits - Demonstrate that the system can support an audit procedure to verify
that submissions (SIP or AIP) meet specified requirements of the repository.
The audit method may be based on sampling, periodic review, or peer review.
[See NLM DRD Functional Requirements document, section 7.4.5 for
description of audit requirements.] (Also partially covered by 7.2.4.2)
7.4.5.1
7.4.5.2
Metadata audit - Demonstrate that the system can audit metadata as part of
the audit procedure.
7.4.5.2
7.4.5.3
7.4.5.3
7.4.5.4
Audit report - Demonstrate that the system can generate an audit report,
based on the results of periodic audits of SIPs and AIPs.
7.4.5.4
7.4.5.5
Audit trail - Demonstrate that the system maintains an audit trail of all actions
regarding the auditing of SIPs and AIPs.
7.4.5.5
7.4.5.1
0
0
0
0
7.6.1.1
7.6.1.1
7.6.1.2
7.6.1.2,
7.6.1.3
7.6.1.4
7.6.1.4
7.6.1.7
7.6.1.7
7.6.1.5
7.6.1.5
7.6.1.6
Manage system rights - Demonstrate ultimate system rights access for NLM
system administrators and programmers.
7.6.1.6
0
3
A
7.6.1.8
7.6.1.9
7.6.1.9
7.6.1.13
7.6.1.13
7.6.1.14
7.6.1.14
7.6.1.16
7.6.1.16
7.6.1.17
7.6.1.17
7.6.1.18
7.6.1.18
7.6.1.10
Access rights - Demonstrate access rights and conditions of use are applied
to each digital object and its related metadata and are machine readable and
actionable.
7.6.1.10,
7.6.1.11
7.6.1.12
7.6.1.12
7.6.1.15
7.6.1.15
A
7.6.1.19
7.6.1.20
7.6.1.20,
7.6.1.21,
7.6.1.22,
7.6.1.23,
7.6.1.24
7.6.1.25
7.6.1.25
7.6.1.26
7.6.1.26
7.6.1.29
7.6.1.29
7.6.1.30
7.6.1.30
7.6.1.31
0
0
7.6.1.31
7.6.1.32
7.6.1.32
7.6.1.33
7.6.1.33
7.6.1.34
7.6.1.34
7.6.1.35
7.6.1.35
7.6.1.36
7.6.1.36
7.6.1.37
7.6.1.37
7.6.1.38
7.6.1.38
7.6.1.39
7.6.1.39
7.6.1.40
7.6.1.40
0
The record does describe the
bitstream formats, but doesn't
suggest the "appropriate" one
1
0
A
1
7.6.2.1
7.6.2.1
7.6.2.2
7.6.2.2,
7.6.2.3,
7.6.2.4
7.6.2.7
Audit trail - Demonstrate an audit trail of all actions is created and stored.
7.6.2.7
7.6.2.5
7.6.2.5
7.6.2.6
See above.
7.6.3.1
7.6.3.1
7.6.3.2
7.6.3.2
7.6.3.3
7.6.3.3
7.6.3.5
7.6.3.5
7.6.3.6
Audit trail - Demonstrate an audit trail of all actions is created and stored.
7.6.3.6
7.6.3.4
7.6.3.4
7.6.2.6
8.1.1
8.1.1
M/T
8.1.2
8.1.2
Batch - 0; manual - 1
8.1.5
8.1.5
Rather clunky
1 (M & T)
0-1
8.1.6a
Metadata search and display - Demonstrate the ability to search and display
metadata (use of external tool possible).
8.1.6a
8.1.8
8.1.8
M/T
8.1.9
8.1.9
M/T
App A
App A
0 (M & T)
Only exports collections/files in
METS (via command line, not the
web interface) and is working on
METS import capability.
1 (M & T)
9.1.1
9.1.1
9.1.2
Z39.50 - By design analysis, confirm that the system can respond to data
requests using the Z39.50 standard.
9.1.2
9.1.3
SRU/SRW - By design analysis, confirm that the system can respond to data
requests using the SRU and SRW data access standards.
9.1.3
9.1.4
SOAP - Demonstrate that the system can respond to web service requests
using SOAP.
9.1.4
9.1.5
9.1.5
9.1.6
9.1.6
9.1.7
Z39.87 - By design analysis, confirm that the system supports the Z39.87
image metadata standard.
9.1.7
0
0
0
3
0
0
Notes:
Back button on browser cannot function as a navigation tool all the time, and there is no other navigation tool. (KK)
10.2
Files are just listed in the order they were ingested and cannot be sorted by item (KK).
10.3
Sub-community hierarchies get lost in the collection selection window during submission (FK).
10.4
Batch ingest does allow customized licenses to be included for different items (EL).
10.5
10.6
DSpace creates two XML files for item(s) containing both DC and NLM/DC metadata (such as permanence) during the export process. The dublincore.xml for all DC
elements and metadata_nlm.xml for all NLM/DC elements. (EL)
10.7
DSpace tracks every action as an entry in a text-based log file but the log file doesnt reveal the specific action taken. The History file, on the other hand, records more
specific details than the log file but some of the entries dont seem related to the actual action. For example, adding a subject and modifying an item type are recorded as
updated bit streams and updated bundles in the history file. No tools are provided to access the history file. We should check with the DSpace community to see if there are
any available tools already. (EL)
Test ID
Source
Requirements
Subgroup
See Note
1
Score
(0-3)
Note 2
File types - Demonstrate that the system can ingest content in all the file formats
listed as "supported" in Appendix B of the NLM DR Functional Requirements
document (plus MP3 and JPEG2000), specifically: MARC, PDF, Postscript, AIFF,
MPEG audio, WAV, MP3, GIF, JPEG, JPEG2000, PNG, TIFF, HTML, text, RTF, XML,
MPEG.
Demonstrate that the system can ingest the following types of content: articles,
journals, images, monographs, audio files, video files, websites, numeric data, text
files, and databases.
Conduct this test element by ingesting the set of files listed in the Test File
spreadsheet. (The files listed in this spreadsheet contain examples of all the file
formats, and all the content types identified above.)
7.1.1.7
7.1.1.9
Manual review - Demonstrate that the system has the capability to require that
submitted content be manually reviewed before it is accepted into the repository.
Demonstrate that the system maintains submitted content in a staging area before it is
accepted.
Demonstrate that the system notifies a reviewer when new content is ready for review.
(Also see tests for 7.1.4.1, 7.1.4.2, and 8.1.2.)
7.1.1.1
7.1.1.2
7.1.1.2,
7.1.1.10
a - yes
b - no
c - no
d - yes
e - yes
7.1.1.3
Reason for rejection - Demonstrate that the system records a set of identifying
information or metadata that describes the reason for the rejection of submitted
content. Demonstrate two cases: (1) automatic rejection, and (2) rejection by a
human reviewer.
7.1.1.3
1 - no
2 - maybe - needs further testing
7.1.1.4
Rejection filter - Demonstrate that the system allows the creation of a filter that can
be used to automatically reject submitted content. (This capability will eliminate the
need for manual review of some submissions and resubmissions.)
7.1.1.4
7.1.1.7
7.1.1.1
Notes
7.1.1.5
Rejection notification - Demonstrate that the system can notify the producer or
donor when submitted content is rejected. Demonstrate two cases: (1) notification
after immediate rejection by an automated process, and (2) notification after rejection
by manual review.
7.1.1.5,
7.1.1.11
(7.1.1.8)
Metadata types - Demonstrate that the system can ingest content with associated
metadata in the following formats: all NLM DTDs, Dublin Core, MARC21, MARCXML,
ONIX, MODS, EAD, TEI, PREMIS, METS. (NOTE: This test is covered by tests 8.1.1,
8.1.8, and 8.1.9)
7.1.1.8,
8.1.1,
8.1.8,
8.1.9
M/T
7.1.1.10
Format conversion - Demonstrate that the system has the capability to convert the
format of a file being ingested to a desired supported format. As a test case,
demonstrate that a WAV file can be converted to MP3 format when it is ingested. (An
external tool may be needed to perform the conversion. If this is the case,
demonstrate that the system can invoke the required external tool.)
7.1.1.10,
7.1.1.2
7.1.1.12
Resubmission - Demonstrate that the system can ingest a SIP that is resubmitted
after an error in the SIP was detected and corrected. Demonstrate two cases: the
resubmission can occur after an error was detected in (1) the content of the SIP, and
(2) the metadata of the SIP.
7.1.1.12
7.1.1.14
Versions - Demonstrate that the system can store, track, and link multiple versions of
a file.
7.1.1.14
7.1.1.15
a
Unique identifiers - Demonstrate that the system assigns a unique identifier to each
object ingested. Demonstrate two cases: (1) a unique identifier assigned to a digital
object, which may be comprised of a set of component files, and (2) a unique identifier
assigned to each of the component files of a digital object.
7.1.1.15a,
7.1.1.15b
7.1.1.15b
Audit trail - Demonstrate that the system maintains an audit trail of all actions
regarding receiving submissions (SIPs).
7.1.1.16
7.1.1.15
b
7.1.1.16
T=2.5
M=2.5
T
3
T
T
7.1.2.1
Virus checking - By design analysis, confirm that the system performs automatic
virus checking on submitted content files.
7.1.2.1
7.1.2.2
Transmission errors - Demonstrate that the system uses MD5, CRC, checksums, or
some other bit error detection technique to validate that each data file submitted is
received into the repository staging area without transmission errors.
7.1.2.2
2.5
7.1.2.3
7.1.2.3
7.1.2.4
7.1.2.4
7.1.2.5
7.1.2.5
7.1.2.6
File/batch accept/reject - Demonstrate that the system enables NLM staff to accept
or reject submitted content (SIPs) at the file or batch level.
7.1.2.6
7.1.2.7b
Error reports - Demonstrate that the system generates error reports for ingest quality
assurance problems.
7.1.2.7b
7.1.2.8
Adjustable level of manual QC - By design analysis, confirm that the system has the
ability to adjust the level of manual ingest quality control needed, based on the origin
of the file.
7.1.2.8
7.1.2.9
Audit trail - Demonstrate that the system maintains an audit trail of all actions
regarding ingest quality assurance.
7.1.2.9
1.5
0
0
7.1.4.1
7.1.4.2
7.1.4.2
7.1.4.4
7.1.4.4
7.1.4.5
7.1.4.7
Audit trail - Demonstrate the creation of an audit trail of all actions.
7.1.3 Ingest - Generate AIP
7.1.4.7
Note 3
M
P
Note 3
Note 3
Note 3
Note 3
7.1.4.1
7.1.4.5
M
3
1.5
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
7.4 Administration
Note 3
P1 - Generate AIP
P1-1
Generate AIP - Demonstrate the generation of AIPs from ingested SIPs that do not
need normalization.
7.1.3.1,
7.1.3.2,
7.1.3.3,
7.4.1
P1-2
7.1.3.1,
7.1.3.2,
7.1.3.3,
7.4.1
No normalization.
P1-3
Derivative files - Demonstrate the generation of AIPs that consist of master files and
derivatives.
7.1.3.6
1.5
P1-4
Master files - Demonstrate the generation of AIPs that consist of master files only.
7.1.3.6
P1-5
Store AIP in archival storage - Demonstrate the ability to transfer AIPs to Archive
Storage.
7.1.5.1,
7.2.1.1,
7.2.1.2
See P1-1
P1-6
7.1.5.2,
7.3.4.1
P1-7
7.1.5.4
Yes
P1-8
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P1-9
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P1-10
Send error reports - Demonstrate the ability to automatically send error reports to
ingest and/or receivers when AIP and/or metadata transfers fail.
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P2-1
7.2.2.1,
7.2.3.2,
7.2.4.1
P2-2
7.2.4.2,
7.3.1.1,
7.3.1.2,
7.4.4
P2-3
7.2.4.2,
7.3.1.1,
7.3.1.2,
7.4.4
P2-4
Disaster recovery - Demonstrate the ability to allow for disaster recovery including
data backup, off-site data storage, and data recovery.
7.2.4.3
P2-5
User views - Demonstrate the ability to allow for customized user views of the
contents of the storage (create, maintain, and access).
7.3.1.4
P2-6
7.4.2
1.5
P2-7
7.3.1.3
P2-8
Delete AIPs - Demonstrate the ability to allow the authorized staff to delete AIPs from
the repository including: removing the digital object's files and retaining associated
metadata, or removing both the files and metadata.
7.4.3.4
P2-9
7.4.3.5
No alert.
P2-10
File migrations - Demonstrate the ability to allow the authorized staff to schedule and
perform file migrations or migration on request for batched and individual files by
authorized staff.
7.4.3.6
P2-11
Request DIPs for update - Demonstrate the ability to allow the authorized staff to
request DIPs for file migrations and data updates.
7.3.4.1,
7.3.4.2,
7.3.4.3,
7.4.3.1,
7.4.3.2,
7.4.6.2
P2-12
Re-ingest updated DIPs - Demonstrate the ability to allow the authorized staff to
reingest updated DIPs as SIPs.
7.4.3.3
P2-13
Support query requests - Demonstrate the ability to receive, retrieve, display, and
deliver data for query requests from other functions such as Ingest, Access, and
Administration.
7.3.2.1,
7.3.2.3,
7.4.6.1
Yes.
P2-14
Query requests from different storage locations - Demonstrate the ability to handle
query requests with required data to be sourced from different storage locations.
7.3.2.2
2.5
P2-15
Queries against all metadata - Demonstrate the ability to run data queries against all
metadata used to manage the repository.
7.3.2.4
Yes
2.5
P2-16
Audit trial - Demonstrate the creation of an audit trail of all actions including who,
when, how, what and where for Archive Storage and Data Management Database.
7.1.3.4,
7.1.5.6,
7.2.1.4,
7.2.2.3,
7.2.5.2,
7.3.2.5,
7.3.3.7,
7.3.4.6,
7.4.3.7,
7.4.6.4
P2-17
Generate reports - Demonstrate the ability to receive, generate, display, and deliver
management information reports and statistics such as summaries of repository
holdings by category, summaries of updates by category, user codes, etc., usage
statistics for access to repository holdings, and descriptive information for a specific
AIP.
7.3.3.1,
7.3.3.2,
7.3.3.5,
7.3.4.4
P2-18
7.3.3.4
P2-19
Time period for reports - Demonstrate the ability to allow the user to specify a time
period or set of time periods for reports and statistics.
7.3.3.6
P3 - Generate DIP
P3-1
Generate DIP for access requests - Demonstrate the generation of DIPs by putting
AIPs and Descriptive Information back together for access requests.
7.1.5.5,
7.2.5.1,
7.4.6.2
Yes
P3-2
7.4.6.2,
7.4.3
T
7.4.1.1
7.4.1.2
7.4.1.2
7.4.1.5
Terms of submission agreements - Demonstrate that the system stores the terms of
submission agreements, and uses the terms to monitor, review, and process
submissions.
7.4.1.5
7.4.1.6
Audit trail - Demonstrate that the system maintains an audit trail of all actions related
to submission agreements.
7.4.1.6
0
0
7.4.2.1
7.4.2.1
7.4.2.2
System configuration - By design analysis, confirm that the system maintains the
integrity of the system configuration.
7.4.2.2
7.4.2.3
7.4.2.3
7.4.2.4
Data management information - Demonstrate that the system collects and can
display system information concerning Data Management.
7.4.2.4
7.4.2.5
Operational statistics - Demonstrate that the system collects and can display
operational statistics concerning Archival Storage.
7.4.2.5
T
0
7.4.5.1
Audits - Demonstrate that the system can support an audit procedure to verify that
submissions (SIP or AIP) meet specified requirements of the repository. The audit
method may be based on sampling, periodic review, or peer review. [See NLM DRD
Functional Requirements document, section 7.4.5 for description of audit
requirements.] (Also partially covered by 7.2.4.2)
7.4.5.1
7.4.5.2
Metadata audit - Demonstrate that the system can audit metadata as part of the audit
procedure.
7.4.5.2
7.4.5.3
Audit rejection - Demonstrate that the system can reject components of audited
information packages, based on specified audit requirements.
7.4.5.3
7.4.5.4
Audit report - Demonstrate that the system can generate an audit report, based on
the results of periodic audits of SIPs and AIPs.
7.4.5.4
7.4.5.5
Audit trail - Demonstrate that the system maintains an audit trail of all actions
regarding the auditing of SIPs and AIPs.
7.4.5.5
7.6.1.1
Manage user permissions - Demonstrate the access controls for multiple permission
levels and user privileges.
7.6.1.1
7.6.1.2
Manage user restrictions - Demonstrate multiple levels of access restrictions for NIH
employees and general public based on licensing terms, embargo periods, IP range
restrictions, workstation access, and other possible legal restrictions.
7.6.1.2,
7.6.1.3
7.6.1.4
Manage user settings - Demonstrate access settings allow staff to add or edit
descriptive metadata
7.6.1.4
7.6.1.7
Audit users - Demonstrate access mechanisms can identify individual users and
maintain audit log of user actions.
7.6.1.7
7.6.1.5
7.6.1.5
7.6.1.6
Manage system rights - Demonstrate ultimate system rights access for NLM system
administrators and programmers.
7.6.1.6
7.6.1.8
Manage access rights - Demonstrate access rights and conditions to materials and
storage directories provide for a combinational of create/write; edit; read; delete
privileges.
7.6.1.8
7.6.1.9
Manage metadata rights - Demonstrate access rights may be associated with the
metadata relating to an individual object
7.6.1.9
7.6.1.13
7.6.1.13
7.6.1.14
7.6.1.14
7.6.1.16
Automated retrieval - Demonstrate objects in the repository are accessible for data
mining or automated retrieval.
7.6.1.16
7.6.1.17
7.6.1.17
7.6.1.18
7.6.1.18
7.6.1.10
Access rights - Demonstrate access rights and conditions of use are applied to each
digital object and its related metadata and are machine readable and actionable.
7.6.1.10,
7.6.1.11
7.6.1.12
7.6.1.12
7.6.1.15
7.6.1.15
7.6.1.19
7.6.1.19
7.6.1.20
7.6.1.20,
7.6.1.21,
7.6.1.22,
7.6.1.23,
7.6.1.24
7.6.1.25
Search results display - Demonstrate search results display includes date sort;
relevancy ranking; alpha by author or source.
7.6.1.25
7.6.1.26
7.6.1.26
7.6.1.29
7.6.1.29
7.6.1.30
7.6.1.30
7.6.1.31
7.6.1.31
7.6.1.32
7.6.1.32
7.6.1.33
Object access - Demonstrate access to the appropriate copy of the identified item
(text, image, video, etc.)
7.6.1.33
7.6.1.34
7.6.1.34
7.6.1.35
7.6.1.35
7.6.1.36
7.6.1.36
7.6.1.37
7.6.1.37
7.6.1.38
7.6.1.38
7.6.1.39
7.6.1.39
7.6.1.40
7.6.1.40
7.6.2.1
7.6.2.1
7.6.2.2
7.6.2.2,
7.6.2.3,
7.6.2.4
7.6.2.7
Audit trail - Demonstrate an audit trail of all actions is created and stored.
7.6.2.7
7.6.2.5
Response and delivery - Demonstrate that the prepared DIP response is placed in
the staging area and a message is generated and sent to Coordinate Access Activities
that the DIP is ready for delivery.
7.6.2.5
7.6.2.6
7.6.2.6
7.6.3.1
7.6.3.1
7.6.3.2
Downloading - Demonstrate export function that provides XML output for batch
downloads
7.6.3.2
7.6.3.3
Saving content - Demonstrate users are allowed to save digital content to a harddrive, e-mail, and/or save search results.
7.6.3.3
7.6.3.5
7.6.3.5
7.6.3.6
Audit trail - Demonstrate an audit trail of all actions is created and stored.
7.6.3.6
7.6.3.4
7.6.3.4
1
1
8.1.1
Metadata formats - Demonstrate that the system can accept metadata associated
with objects in at least the following formats: All NLM DTDs, Dublin Core, MARC21,
MARCXML, ONIX, MODS, EAD, TEI.
8.1.1
M/T
Mapping to DC only
T=2
M=2
8.1.2
8.1.2
Batch=1; Manual = 2
1-2
8.1.5
8.1.6a
8.1.5
8.1.6a
M
M
8.1.8
8.1.8
M/T
8.1.9
METS - Demonstrate standards compliance for METS (use of external tool possible).
8.1.9
M/T
App A
App A
3
1.5
T=0
M=1
T=3
M=2
2.5
9.1.1
OAI-PMH - Demonstrate that the system can respond to OAI-PMH requests as a data
provider.
9.1.1
9.1.2
Z39.50 - By design analysis, confirm that the system can respond to data requests
using the Z39.50 standard.
9.1.2
9.1.3
SRU/SRW - By design analysis, confirm that the system can respond to data requests
using the SRU and SRW data access standards.
9.1.3
9.1.4
SOAP - Demonstrate that the system can respond to web service requests using
SOAP.
9.1.4
9.1.5
9.1.5
9.1.6
OpenURL - By design analysis, confirm that the system is compliant with OpenURL.
9.1.6
9.1.7
Z39.87 - By design analysis, confirm that the system supports the Z39.87 image
metadata standard.
9.1.7
3
1.5
Notes:
Source
Requir
ements
Subgroup
See Note
1
Fedora
Fez
Score
(0-3)
Note 2
Both or Not Sure
7.1.1.7
File types - Demonstrate that the system can ingest content in all the file
formats listed as "supported" in Appendix B of the NLM DR Functional
Requirements document (plus MP3 and JPEG2000), specifically: MARC,
PDF, Postscript, AIFF, MPEG audio, WAV, MP3, GIF, JPEG, JPEG2000,
PNG, TIFF, HTML, text, RTF, XML, MPEG.
Demonstrate that the system can ingest the following types of content:
articles, journals, images, monographs, audio files, video files, websites,
numeric data, text files, and databases.
Conduct this test element by ingesting the set of files listed in the Test File
spreadsheet. (The files listed in this spreadsheet contain examples of all
the file formats, and all the content types identified above.)
7.1.1.7
7.1.1.9
7.1.1.1
Manual review - Demonstrate that the system has the capability to require
that submitted content be manually reviewed before it is accepted into the
repository.
Demonstrate that the system maintains submitted content in a staging area
before it is accepted.
Demonstrate that the system notifies a reviewer when new content is ready
for review.
(Also see tests for 7.1.4.1, 7.1.4.2, and 8.1.2.)
Review and acceptance workflow - Demonstrate that the system
supports a workflow for the review and acceptance of submitted content.
Demonstrate that the workflow includes the following functions:
a - Receive and track content from producers;
b - Validate content based on submitter, expected format, file quality,
duplication, and completeness;
c - Normalize content by converting content into a supported format for final
ingestion into the repository;
d - Human review of content;
e - Acceptance or rejection of content or file format.
7.1.1.1
0 - Fedora
provides no
manual
review.
7.1.1.2,
7.1.1.1
0
0 - Fedora
provides no
review and
acceptance
workflow.
1.5
7.1.1.3
0 - Fedora
provides no
review and
rejection
workflow.
7.1.1.2
7.1.1.3
Notes
7.1.1.4
Rejection filter - Demonstrate that the system allows the creation of a filter
that can be used to automatically reject submitted content. (This capability
will eliminate the need for manual review of some submissions and
resubmissions.)
7.1.1.4
7.1.1.5
7.1.1.5,
7.1.1.1
1
(7.1.1.
8)
Metadata types - Demonstrate that the system can ingest content with
associated metadata in the following formats: all NLM DTDs, Dublin Core,
MARC21, MARCXML, ONIX, MODS, EAD, TEI, PREMIS, METS. (NOTE:
This test is covered by tests 8.1.1, 8.1.8, and 8.1.9)
Format conversion - Demonstrate that the system has the capability to
convert the format of a file being ingested to a desired supported format.
As a test case, demonstrate that a WAV file can be converted to MP3
format when it is ingested. (An external tool may be needed to perform the
conversion. If this is the case, demonstrate that the system can invoke the
required external tool.)
7.1.1.8,
8.1.1,
8.1.8,
8.1.9
7.1.1.1
0,
7.1.1.2
M/T
7.1.1.1
2
7.1.1.1
4
7.1.1.1
5a,
7.1.1.1
5b
7.1.1.1
0
7.1.1.1
2
7.1.1.1
4
7.1.1.1
5a
0 - Fedora
has no
review /
rejection
workflow or
rejection
filter.
0 - no review
/ rejection
workflow or
rejection
notification.
M=2.75, T=3
0 - Fez provides no
rejection filter.
0 - no rejection notification
M=2.75,T
=2
, T=3
2 - Fedora
disseminator
s can provide
converted
files at the
time of
access.
1
M=2.75
2 - Fez uses ImageMagik
to
convert image formats,
create thumbnails.
3 - Every
datastream
in an object
(external file
or embedded
XML) can
have multiple
versions,
which are
stored and
linked from
the object,
and can be
individually
retrieved.
3 - Unique
identifier for
every object,
and every
datastream
(file or
metadata)
within the
object.
7.1.1.1
5b
7.1.1.1
5b
7.1.1.1
6
Audit trail - Demonstrate that the system maintains an audit trail of all
actions regarding receiving submissions (SIPs).
7.1.1.1
6
3Relationship
s stored as
RDF in
RELS-EXT
datastream
of every
object. RDF
Triplestore
used for
quick search
and retrieval
of
relationships.
Extendable
ontology of
object
relationships
provided.
2.5 - AUDIT
datastream
(XML)
included in
every
object's
FOXML,
records
submission
events.
1 - Limited exposure of
Fedora's underlying
relationships.
2.5
7.1.2.1
7.1.2.1
7.1.2.2
7.1.2.2
1 - See note.
7.1.2.3
7.1.2.3
7.1.2.4
7.1.2.4
7.1.2.5
7.1.2.6
7.1.2.5
7.1.2.6
0 - no transmission error
checks
7.1.2.7
b
7.1.2.8
Error reports - Demonstrate that the system generates error reports for
ingest quality assurance problems.
Adjustable level of manual QC - By design analysis, confirm that the
system has the ability to adjust the level of manual ingest quality control
needed, based on the origin of the file.
7.1.2.9
Audit trail - Demonstrate that the system maintains an audit trail of all
actions regarding ingest quality assurance.
7.1.4 Ingest - Generate Descriptive Information / Metadata
7.1.2.7
b
7.1.2.8
7.1.2.9
7.1.4.1
7.1.4.1
7.1.4.2
7.1.4.2
7.1.4.4
7.1.4.4
7.1.4.5
7.1.4.5
7.1.4.7
Note 3
M
P
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
Note 3
7.4 Administration
Note 3
P1 - Generate AIP
P1-1
P
7.1.3.1,
7.1.3.2,
7.1.3.3,
7.4.1
P1-2
P1-3
7.1.3.1,
7.1.3.2,
7.1.3.3,
7.4.1
7.1.3.6
1.5
No normalization.
0
P1-4
7.1.3.6
P1-5
P1-6
7.1.5.1,
7.2.1.1,
7.2.1.2
7.1.5.2,
7.3.4.1
P1-7
7.1.5.4
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P1-8
P1-9
P1-10
7.1.5.1,
7.1.5.3,
7.2.1.3,
7.3.3.3
P
7.2.2.1,
7.2.3.2,
7.2.4.1
0
3
Fedora generates a
checksum for every ingested
datastream. A pregenerated checksum could
be supplied in the ingest
process but the validation
process seems having bugs
(fail any supplied checksum,
good or bad).
P2-2
P2-3
7.2.4.2,
7.3.1.1,
7.3.1.2,
7.4.4
Fedora maintains a
checksum for each
datastream in the repository
but provides no referential
integrity check.
No referential integrity
check.
7.2.4.2,
7.3.1.1,
7.3.1.2,
7.4.4
7.2.4.3
2
1
1
1
P2-4
P2-5
User views - Demonstrate the ability to allow for customized user views of
the contents of the storage (create, maintain, and access).
System CM - Demonstrate the ability to allow for configuration
management of the system hardware and software.
7.3.1.4
7.4.2
2.5
2.5
7.3.1.3
7.4.3.4
7.4.3.5
P2-6
P2-7
P2-8
P2-9
P2-10
P2-11
7.4.3.6
7.3.4.1,
7.3.4.2,
7.3.4.3,
7.4.3.1,
7.4.3.2,
7.4.6.2
P2-12
7.4.3.3
P2-13
7.3.2.1,
7.3.2.3,
7.4.6.1
7.3.2.2
P2-15
Queries against all metadata - Demonstrate the ability to run data queries
against all metadata used to manage the repository.
7.3.2.4
2.5
2.5
P2-16
2.5
1.5
2.5
P2-17
7.1.3.4,
7.1.5.6,
7.2.1.4,
7.2.2.3,
7.2.5.2,
7.3.2.5,
7.3.3.7,
7.3.4.6,
7.4.3.7,
7.4.6.4
7.3.3.1,
7.3.3.2,
7.3.3.5,
7.3.4.4
P2-14
P2-18
P2-19
Schedule reports - Demonstrate the ability to generate reports in an adhoc manner, automatically or to be triggered by a calendar or by a specific
system event.
Time period for reports - Demonstrate the ability to allow the user to
specify a time period or set of time periods for reports and statistics.
7.3.3.4
7.3.3.6
P3 - Generate DIP
P3-1
P3-2
7.1.5.5,
7.2.5.1,
7.4.6.2
7.4.6.2,
7.4.3
2
2
7.4.1.1
7.4.1.2
7.4.1.5
7.4.1.6
7.4.2.1
7.4.2.1
7.4.2.2
7.4.2.3
7.4.2.4
0 - Info
stored in
FOXML
objects;
some info
saved to
relational DB
1 - Log file
contains
errors for
sysadmin
and
programmer.
Log files at
file level.
Audit trail for
each object
in FOXML.
0
7.4.2.5
7.4.1.2
7.4.1.5
7.4.2.2
7.4.2.3
7.4.2.4
Easy-to-use command-line
function that rebuilds
Resource Index and
relational DB if corruption
occurs.
7.4.5.1
7.4.5.1
7.4.5.2
7.4.5.3
7.4.5.4
7.4.5.5
7.6.1.1
7.6.1.1
7.6.1.2
7.6.1.2,
7.6.1.3
User
permissions
are
controlled via
XACML.
Custom
policies can
be created,
and policies
can be
nested
logically.
XACML
policies can
be written to
allow or deny
access at
every level of
object
aggregation,
using IP
range,
inactive/delet
ed status of
datastreams,
etc. Fedora
supports
LDAP simple
user/passwor
d out of the
box, but
other
sources can
be
configured.
Access restrictions to
communities are granular
but not as visible as we
would like. AD integration
is very attractive.
7.6.1.4
7.6.1.4
7.6.1.7
7.6.1.7
7.6.1.5
7.6.1.5
XACML
policies can
be written to
allow or deny
access at the
datastream
level.
Metadata
editing
requires the
Fedora
client.
Every
change to a
datastream
can be
versioned
with audit
trail record.
Fedora
allows
adding files,
and files can
be
manipulated
via
disseminator
s. Some
troubleshooti
ng will
require the
client or
command
line actions.
Granular, role-based
access to add or edit
descriptive metadata. This
takes some up-front
configuration, but works
OK.
7.6.1.6
7.6.1.6
Some admin
access is
controlled by
database
and OS
accounts, but
Fedora user
privileges are
controlled via
the XACML
policies.
Granular
access
control to
objects\datas
treams\disse
minators or
aggregates\r
epositorywide policies
via XACML.
Custom
policies can
be created,
and policies
can be
nested
logically.
Granular
access
control to
objects\datas
treams\disse
minators,
including
metadata
datastreams,
via XACML
policies.
XACML
policies can
utilize the
RELS-EXT
values to
allow or deny
access.
XACML
policies can
be assigned
to a content
model or by
PID.
7.6.1.8
7.6.1.8
7.6.1.9
7.6.1.9
7.6.1.1
3
7.6.1.1
3
7.6.1.1
4
7.6.1.1
4
7.6.1.1
6
7.6.1.1
6
7.6.1.1
7
7.6.1.1
7
7.6.1.1
8
7.6.1.1
8
7.6.1.1
0
7.6.1.1
0,
7.6.1.1
1
7.6.1.1
2
7.6.1.1
2
Automated
retrieval is
not
facilitated,
but
comprehensi
ve indexing
of metadata
and fulltext is
available
with indexing
plug-in.
Fedora
supports
write-once,
where any
changes to
datastreams
are
versioned.
Fedora
includes an
OAI provider
to expose
content for
harvesting.
Recently
rewritten for
Fedora 3.0.
XACML
policies are
machinereadable by
design.
Policies can
be applied at
the
datastream
level and all
higher
aggregations
of content.
Versioning of underlying
datastreams is delegated to
Fedora. Metadata,
attached files and
hyperlinks can be
versioned through Fez.
7.6.1.1
5
7.6.1.1
5
XACML
policies can
be written to
allow or deny
access at
every level of
object
aggregation,
using IP
range,
inactive/delet
ed status of
datastreams,
etc. Policies
should be
able to
accommodat
e embargo
logic
("moving
wall").
Fedora's
thick client
does not
appear to be
Section 508
compliant.
However,
NLM staff
could use
alternative
methods for
ingesting and
managing
content such
as running
UNIX
commands
or via a Web
UI. Section
508
compliance
is a design
goal in any
upcoming UI
development
.
Metadata
searching
with some
operators,
less GUI
than Fez.
GSearch
supports full
text indexing
and
Fez is an Australian
product, so it is not bound
by the Section 508
requirements. Since the
product is open-source,
NLM could easily tweak the
HTML templates, etc. to
create accessible UIs, etc.
were feasible.
1.5
7.6.1.1
9
7.6.1.1
9
7.6.1.2
0
7.6.1.2
0,
7.6.1.2
1,
7.6.1.2
2,
7.6.1.2
3,
7.6.1.2
4
searching,
proximity.
7.6.1.2
5
7.6.1.2
5
7.6.1.2
6
7.6.1.2
6
7.6.1.2
9
7.6.1.2
9
7.6.1.3
0
7.6.1.3
0
7.6.1.3
1
7.6.1.3
1
7.6.1.3
2
7.6.1.3
3
7.6.1.3
2
7.6.1.3
3
7.6.1.3
4
7.6.1.3
5
7.6.1.3
4
7.6.1.3
5
none of
these
functions are
present
Fedora lets
you select
the fields to
display.
no custom
ordering of
results.
Default order
is by PID.
n/a
0
Datastreams
have no
preference.
A
A
0
Response
time is
acceptable,
within our
test
environment
Response time is
acceptable, within our test
environment and limited
collection.
and limited
collection.
so far,
evidence
suggests
only library
web pages
with a
"browse
view"
external to
Fedora are
spidered.
Fedora has a
built-in OAIPMH
Provider
Interface,
and all
objects have
a compliant
DC record.
Only the DC
metadata
may be
disseminated
, however.
Chinese
characters
do not
display in
test record
(fedorans:13
7).
Chinese characters
displayed in search results
(fedorans:137), but not
searchable.
Fedora
objects can
be versioned
at every
level,
including
disseminator
s.
Only default
systemprovided
search
settings are
offered.
No
functionality
built-in to
No functionality built-in to
Fez for this.
7.6.1.3
6
7.6.1.3
6
7.6.1.3
7
7.6.1.3
7
7.6.1.3
8
7.6.1.3
8
7.6.1.3
9
7.6.1.3
9
7.6.1.4
0
7.6.1.4
0
A
7.6.2.1
Fedora for
this.
7.6.2.2
7.6.2.2,
7.6.2.3,
7.6.2.4
7.6.2.7
Audit trail - Demonstrate an audit trail of all actions is created and stored.
7.6.2.7
7.6.2.5
7.6.2.5
7.6.2.6
7.6.2.6
AIP/DIP is conceptual.
Search interface can
provide links to multiple
derivatives of an object, the
archival master and
associated metadata.
This aspect
of OAIS is
not currently
modeled by
Fedora.
Fedora does
not appear to
use a staging
area but
serves
requested
content
directly from
the
repository.
No staging
storage area
per se, but
disseminator
s can
process the
master
file(s),
separating it
from the DIP.
Fedora has a
fairly limited
web interface
for retrieval.
AIP/DIP is
conceptual,
but the
search API
can result in
a list of any
and all
datastreams,
including all
metadata
associated
with the
object.
Tomcat logs
can provide
disseminatio
n requests
(according to
Indiana Univ.
DLP).
A
7.6.3.1
Disseminator layer of
Fedora is quite powerful and
flexible, but cumbersome to
configure in 2.2.3. Fez's
inability to leverage the
Fedora disseminators is a
big downside.
7.6.3.2
7.6.3.2
Objects can
be exported
as METS
packages,
and some
individual
datastreams
are
downloadabl
e as XML.
7.6.3.3
7.6.3.3
7.6.3.5
7.6.3.5
7.6.3.6
Audit trail - Demonstrate an audit trail of all actions is created and stored.
7.6.3.6
7.6.3.4
7.6.3.4
Files may be
downloaded.
There does
not appear to
be a function
for emailing
or saving
search
results.
This aspect
of OAIS is
not currently
modeled by
Fedora.
Tomcat logs
can provide
disseminatio
n requests
(according to
Indiana Univ.
DLP).
Demonstrate
d retrieval of
objects via
the UI
without
issue.
Demonstrated retrieval of
objects via the UI without
issue.
8.1.2
8.1.5
8.1.6a
8.1.1
M
M/T
8.1.2
8.1.5
2.5
8.1.6a
2.5
T=3
M=3
T=3
M=3
Fedora is completely
agnostic about what kinds of
metadata and number of
metadata objects that can
be assigned to any object
Fedora would need an
additional tool to perform
checks.
Fedora client only has one
template field for descriptive
title; actual object metadata
box can take anything just
need disseminator to do
something with it.
8.1.8
8.1.8
M/T
T=3
M=3
T=3
M=3
8.1.9
8.1.9
M/T
T=3
M=3
App A
T=3 Fedora
can ingest
METS SIPs,
and export
objects in
METS
format. M=3
3
9.1.1
T
T
Z39.50 - By design analysis, confirm that the system can respond to data
requests using the Z39.50 standard.
SRU/SRW - By design analysis, confirm that the system can respond to
data requests using the SRU and SRW data access standards.
9.1.2
SOAP - Demonstrate that the system can respond to web service requests
using SOAP.
UNICODE - Demonstrate that the system supports UNICODE.
App A
9.1.2
9.1.3
9.1.4
9.1.5
9.1.6
9.1.7
Notes:
9.1.3
9.1.4
9.1.5
9.1.6
9.1.7